ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D617691D2500
|
Infrastructure Scan
ADDRESS: 0x7ec9e567f4b4f4dcad7291c539812e625948e7b4
DEPLOYED: 2026-05-13 10:32:23
LAST_TX: 2026-05-13 11:10:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Mapping peer nodes for transaction trace… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Analyzing visibility: 5 public, 5 private methods. [MEM] Allocating stack frame for EVM simulation… [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Reverting transaction at PC: 7800… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Finalizing audit report for 0x7ec9e567f4b4f4dcad7291c539812e625948e7b4. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x02ec8f0c37498472d98f7e419cbf6872a6c5f58a 0xf29e333a02085b504816a1a0c45136b5593be504 0x484e1a16054de4b89ce63d32b547d71746f1cee6 0x4aa98b64bd7be188047291d535783d2b5c227196 0x5282012e8269eacafd4ad7ca6b906906925accdf 0xddd6b5b939938d4eb90d416289a62bb7f768f357 0x3bcc16f6e16849258c8eacfa5ebfadbe51cca2eb 0xe6ec440021f73eabc46bf62559b4c02d960ea61f 0x84deb4e458af30df3cf86946765ea86a0291dfbb 0xe7da082b8d63c22b009d3f06740b165ae3ca457c 0x20f52f3035bcde62a171a51bd61c456c2082572b 0xd95723fe263bebb6bffe3b5302eb17aa275349ad 0x76e5eb399a483f65a6cb967a5920fb9f2b9a6fe6 0xac21a31502720d2bfa1907ce7706a0e2bad5bfaa 0xf069d90dfc5aec35224ba37b99dece1d91f8f998 0x15e0d169246fa7308547f903b4feab045554d2f4 0x869df28704881d9d986a5548cd89d02352cac4a6 0xcb3168e89c375fbd0649067b63d5379232763499 0x803e07cc18576507024e309d626f512659caf912 0xf852516daec5d29be4e2925104ab499369735741